The i2 Analyze security schema
An i2 Analyze security schema defines the security dimension values that can be assigned to records, and the security permissions that you assign to groups of users. You must develop a security schema that meets the requirements of your organization.
The fact that the Information Store contains dimension values means that significant changes to the security schema can require you to clear and reingest or repopulate data. This behavior is reasonable while you develop your deployment, but not after you deploy into production. As a result, it is important to refine the security schema before you put it into production.